Subversion-resistant public-key searchable encryption for data sharing in IIoT

被引:0
|
作者
Zhou, Rang [1 ]
He, Yongkang [1 ]
Li, Wanpeng [2 ]
Wang, Yanping [3 ]
Zhang, Xiaojun [4 ]
机构
[1] Chengdu Univ Technol, Coll Comp Sci & Cyber Secur, Chengdu 610059, Peoples R China
[2] Univ Aberdeen, Dept Comp Sci, Aberdeen, Scotland
[3] Xihua Univ, Sch Comp & Software Engn, Chengdu 610039, Peoples R China
[4] Southwest Petr Univ, Sch Comp Sci & Software Engn, Chengdu 610500, Peoples R China
基金
中国国家自然科学基金;
关键词
Searchable encryption; Cryptographic reverse firewall; Subversion-resistant; Industrial Internet of Things (IIoT); KEYWORD SEARCH; SECURE; SCHEME; INTERNET;
D O I
10.1016/j.sysarc.2025.103370
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid growth of the Industrial Internet of Things (IIoT) has driven companies to leverage its potential for enhancing manufacturing efficiency, relying heavily on data analysis. This has led to the collection of vast IIoT data volumes, often stored securely on encrypted cloud servers. To facilitate streamlined data retrieval, keyword search technology is widely employed. Traditional keyword searchable schemes focus on ensuring keyword privacy within the trapdoor and index structures. However, advanced backdoor attacks have emerged as a significant threat. These attacks exploit hidden backdoors in software or hardware, allowing random number manipulation that undermines the security of existing keyword-searchable encryption scheme. To mitigate these attacks, we propose a novel subversion-resistant public-key searchable encryption scheme that incorporates cryptographic reverse firewalls (CRFs). In our scheme, we designed a trust zone to deploy these CRFs. Moreover, the CRFs in the trust zone is randomly chosen to re-randomize the trapdoor and index values, thereby enhancing security against backdoor attacks. Additionally, our scheme facilitates data sharing in the model of one-to-one sending and receiving between different users. Performance testing demonstrates that our scheme requires only lightweight operations for the ReTrapdoor and RePEKS algorithms, making it well-suited for deployment on resource-constrained IIoT devices.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] Efficient Public-Key Searchable Encryption Scheme From PSI With Scalable Proxy Servers
    Kong, Xiangqian
    Chen, Lanxiang
    Zhu, Yizhao
    Mu, Yi
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (06) : 3527 - 3540
  • [22] Cryptanalysis of Keyword Confidentiality in a Searchable Public-Key Encryption Scheme Against Malicious Server
    Zhang, Nan
    Qin, Baodong
    Zheng, Dong
    IET INFORMATION SECURITY, 2025, 2025 (01)
  • [23] Multipurpose Public-Key Encryption
    Zhang, Rui
    He, Kai
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 69 - 84
  • [24] Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT
    Tang, Yongli
    Ba, Yanpeng
    Li, Lixiang
    Wang, Xiaojun
    Yan, Xixi
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (04): : 2305 - 2316
  • [25] An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
    Huang, Qiong
    Li, Hongbo
    INFORMATION SCIENCES, 2017, 403 : 1 - 14
  • [26] Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server
    Zhang, Xiaojun
    Xu, Chunxiang
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 100 (03) : 907 - 921
  • [27] An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy
    Yang, Guang
    Guo, Junling
    Han, Lidong
    Liu, Xuejiao
    Tian, Chengliang
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (01) : 503 - 515
  • [28] An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy
    Guang Yang
    Junling Guo
    Lidong Han
    Xuejiao Liu
    Chengliang Tian
    Peer-to-Peer Networking and Applications, 2022, 15 : 503 - 515
  • [29] Designated-Senders Public-Key Searchable Encryption Secure against Keyword Guessing Attacks
    Saito, Takanori
    Nakanishi, Toru
    2017 FIFTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2017, : 496 - 502
  • [30] An Efficient Public Key Searchable Encryption Scheme for Mobile Smart Terminal
    Yang, Ningbin
    Xu, Shumei
    Quan, Zhou
    IEEE ACCESS, 2020, 8 : 77940 - 77950